Transaction log

Results: 100



#Item
21Transaction Language 1 / Sonic Drive-In / Sonic the Hedgehog / Games / Food and drink / Fast food / Network management

Plate 4 N–S-trending log panel from the Nini-3 well in the north to the John Flank-1 well in the south. Stratigraphic interval covered: Top Chalk Group to Top Lark Formation. Datum: Top Horda Formation. The vertical s

Add to Reading List

Source URL: www.geus.dk

Language: English - Date: 2014-02-09 09:46:02
22Transaction processing / Database management systems / Relational database management systems / Extensible Storage Engine / Algorithms for Recovery and Isolation Exploiting Semantics / Oracle Database / TANGO / Replication / Concurrency control / Data management / Software / Computing

Tango: Distributed Data Structures over a Shared Log Mahesh Balakrishnan∗, Dahlia Malkhi∗, Ted Wobber∗, Ming Wu‡, Vijayan Prabhakaran∗ Michael Wei§, John D. Davis∗, Sriram Rao†, Tao Zou¶, Aviad Zuckk ∗

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2013-11-07 16:40:48
23Purchasing / Business / Technology / Purchasing card

Purchasing Card Transaction Log

Add to Reading List

Source URL: hsofo.utah.gov

Language: English - Date: 2007-02-07 12:48:00
24Password / Transaction authentication number

Registration Instructions With your Fairleigh 1Card handy, go to www.fairleigh1card.com and click on Log In/Register on the Top Menu Panel. Cardholder Registration Page: First section:

Add to Reading List

Source URL: fairleigh1card.com

Language: English - Date: 2012-09-25 18:40:57
25Information / Database theory / Transaction processing / Search algorithms / Relational database / Extensible Storage Engine / Tuple / Database / Transaction log / Database management systems / Data management / Data

An Architecture for Regulatory Compliant Database Management Soumyadeb Mitra #1

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2008-11-24 14:46:36
26Computing / ISO/IEC 27002 / Information security / ISO/IEC 27001 / Security controls / Business continuity / NIST Special Publication 800-53 / Data security / Security / Computer security

Information security implementation in the registry systems. Note by the administrator of the international transaction log.

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2015-04-13 12:26:34
27Climate change policy / Climate change / Flexible Mechanisms / Clean Development Mechanism / Kyoto Protocol / National Institute of Standards and Technology / Carbon finance / United Nations Framework Convention on Climate Change / Environment

Proposed programme budget for the bienniumNote by the Executive Secretary. Addendum. Trust Fund for the International Transaction Log.

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2015-04-13 12:12:17
28Privacy / Technology / Crime prevention / National security / BlackBerry / Audit / Transaction log / Surveillance / Inventory / Information appliances / Personal digital assistants / Security

BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM AUDIT OF BLACKBERRY AND CELL PHONE INTERNAL CONTROLS

Add to Reading List

Source URL: oig.federalreserve.gov

Language: English - Date: 2015-01-21 10:08:59
29Information / Database management systems / Databases / Concurrency control / Database transaction / Serializability / Transaction log / Algorithms for Recovery and Isolation Exploiting Semantics / Extensible Storage Engine / Transaction processing / Data management / Data

High Volume Transaction Processing Without Concurrency Control, Two Phase Commit, SQL or C++  Arthur Whitney Dennis Shasha Stevan Apter

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2007-09-15 02:03:57
30Computing / Data / Microsoft SQL Server / SQL / Database trigger / Database forensics / Transaction log / Database / Select / Data management / Database management systems / Relational database management systems

SQL Server Database Forensics Kevvie Fowler, GCFA Gold, CISSP, MCTS, MCDBA, MCSD, MCSE Black Hat USA 2007 SQL Server Forensics | Why are Databases Critical Assets?  Why are databases critical assets?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:38
UPDATE